varcrypto=require('crypto');varbruteForce=require("jscombinator").comb;vardict=require("jscombinator").dict;varhash="8268c";// The connection returned this hashbruteForce(dict.lower_alpha_numeric,Array.range(1,8),function(value){varstring=value;varcry=crypto.createHash("md5").update(string).digest("hex");console.log(cry+" "+value);if(cry.indexOf(hash)==0){console.log("Correct value of the hash was: "+value);returntrue;}returnfalse;});

After completing the PoW, the script print out the 40 equations.

But we previously had reversed the source script to take the 40 equations as input and bruteforce vibration to find the solution